diff options
author | gregor <gregor@d688527b-c9ab-4aba-bd8d-4036d912da1d> | 2005-07-13 09:46:39 +0000 |
---|---|---|
committer | gregor <gregor@d688527b-c9ab-4aba-bd8d-4036d912da1d> | 2005-07-13 09:46:39 +0000 |
commit | 29c80b52bf13f3646a02d4d3cd17beaf11fecf66 (patch) | |
tree | d2026a8450ba9ecdb6062e51459b16fd7055904e /spss.server | |
parent | 246ab430e61374d6d23b1b30a8ffe614c5589b5f (diff) | |
download | moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.tar.gz moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.tar.bz2 moa-id-spss-29c80b52bf13f3646a02d4d3cd17beaf11fecf66.zip |
Bug 224 behoben.
git-svn-id: https://joinup.ec.europa.eu/svn/moa-idspss/trunk@377 d688527b-c9ab-4aba-bd8d-4036d912da1d
Diffstat (limited to 'spss.server')
-rw-r--r-- | spss.server/history.txt | 4 | ||||
-rw-r--r-- | spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java | 13 |
2 files changed, 17 insertions, 0 deletions
diff --git a/spss.server/history.txt b/spss.server/history.txt index 42930a943..cae539a6a 100644 --- a/spss.server/history.txt +++ b/spss.server/history.txt @@ -2,6 +2,10 @@ Current ############## +- MOA SS Webservice Clients, die sich mit einem Zertifikat ausweisen, können nun + auch auf die Key-Groups des anonymen Key-Group-Mappings zugreifen. + Siehe https://forge.cio.gv.at/bugzilla/show_bug.cgi?id=224. + - MOA SS fit für Mehrfachsignaturen, d.h. mehrere XML-Signaturen in einem XML- Dokument gemacht. Bisher scheiterte das an den fix vergebenen Id-Attributen innerhalb der dsig:Signature-Struktur. diff --git a/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java b/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java index c3ba9fe23..4927bb9b0 100644 --- a/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java +++ b/spss.server/src/at/gv/egovernment/moa/spss/server/config/ConfigurationProvider.java @@ -496,6 +496,19 @@ public class ConfigurationProvider { return keyGroup.getKeyGroupEntries(); } } + + // If no key group is available for a client identified by a certificate, + // try to find a key group in the anonymous key group mapping + if (issuer != null || serial != null) + { + mapping = (Map) keyGroupMappings.get(ANONYMOUS_ISSUER_SERIAL); + if (mapping != null) + { + KeyGroup keyGroup = (KeyGroup) mapping.get(keyGroupId); + if (keyGroup != null) return keyGroup.getKeyGroupEntries(); + } + } + return null; } |